A security architect is locked into a given cryptographic design based on the allowable software at
the company. The key length for applications is already fixed as is the cipher and algorithm in use.
The security architect advocates for the use of well-randomized keys as a mitigation to brute force
and rainbow attacks. Which of the following is the security architect trying to increase in the
design?
A.
Key stretching
B.
Availability
C.
Entropy
D.
Root of trust
E.
Integrity